Security Blog & Other Important News

Cybercriminals aren’t just targeting big business anymore; cybercrime has become the number one threat for small- and medium-sized businesses (SMBs) as well. And the fact that ransomware attacks are becoming more frequent, sophisticated, and costly should

As a health care entity, you know one of your biggest priorities is keeping your patient data safe. That’s really what HIPAA/HITECH is designed to do. It’s a set of standards and compliance that you’ve got to follow to protect patient information.

To really understand what’s going on in a client environment, you have to conduct a gap analysis and it’s got to be a deep gap analysis — one that’s very granular. When we run one, we take into consideration a growing list

In the aftermath of Hurricane Harvey, and remembering our own local devastation after tornadoes and other punishing storms, below are some practical technology tips to keep in mind when the forecast turns dangerous.

NBC5, the Dallas/Fort Worth affiliate, called DKBInnovative last week for IT expertise when they were researching a story about exploding laptops. Kudos to the producers of that story for being so thorough before presenting

The Internet is an increasingly hostile environment. DKBInnovative’s extensive background both as an integrator and consumer of wireless technology makes it possible to offer expert consulting support for a broad range of wireless applications. Our expert “ethical” hacker Randy Haba recently partnered with NBC 5 Responds to show just how easy

Let’s face it, social media is part of every business today. Healthcare providers using social media face thousands of dollars in HIPAA penalties and fees if there is a breach of protected information. Do you have a clear policy and procedure for your team? Here are basic best practices to

Apple Pay is simple to use and works with the devices you use every day. Easily pay with your debit cards and credit cards with just a touch. And because your card details are never shared by Apple when you use Apple Pay, making payments with your iPhone, Apple Watch, iPad, and Mac

High-tech surveillance tools that fit in a briefcase and mimic real cell phone towers to fool nearby mobile phones is one of the resources law enforcement, military and yes – hackers use. These devices called “Stingrays” do everything from pick up calls and texts to jamming cell service

In 2016, the top five reasons for outsourcing IT were enhanced security, proactive approach to technology, maximizing operations, access to newer technologies and cost savings. As a healthcare provider, finding a technology service provider with Healthcare experience is also vital for you.

This New Year we have been inundated with warnings from experts and journalists that 2017 will bring an increase of DDoS, IoT and Ransomware attacks that will far exceed 2016’s record. A New York Times report last year noted 83 million JP Morgan Chase customers had their credentials stolen when hackers

The Internet is an increasingly hostile environment. DKBInnovative’s extensive background both as an integrator and consumer of wireless technology makes it possible to offer expert consulting support for a broad range of wireless applications. Our expert “ethical” hacker Randy Haba recently partnered with NBC 5 Responds to show just how easy

You’ve been thinking that your private practice won’t get hacked? Or that your small, rural hospital is totally under the global cyber crimes radar? That there’s not enough monetary value in your database to interest cyber thieves? You’re just wrong. Private Health Information (PHI) is coveted for identify theft and

Dallas-based IT management and support company DKBInnovative was asked to present an update on technology trends and threats in a professional development seminar sponsored by the National Academy Foundation, specifically for members of the NAF Information Technology departments in the Dallas Independent School District.

Maintaining a secure IT network is paramount for any business — especially in a day and age of sophisticated viruses, rogueware, spyware and the many other threats that can compromise the heart of your company.

Unfortunately, many businesses and their employees are simply too busy and tied up with their

As time passes and technology evolves, viruses and rogueware continue to advance and become more sophisticated. “Scareware” and “ransomware” are two terms that are coming up more and more in offices across the United States.

These are two forms of rogueware that have actually turned into an industry worth over

Picture, for a moment, that your business is hit by a catastrophic incident. Maybe a fire has destroyed your office or your company’s network has been attacked full force by hackers, thus, decimating your system.

How would your business respond? Would it scramble to find the necessary help and resources

At some point in your business growth and development you realized that you could no longer work alone and you started hiring. No matter the size of your staff now, because of technology advancements and the influx of now-necessary web-connected devices, those helpful employees could also be the next open

How costly is it these days to have your internet go down? How impatient are we all when we see “No Service” showing on our smartphones? In today’s business, our consistent connection to the world has become a necessity—and it didn’t take the bad guys long to figure out how

Ransomware can happen to you. In the time it takes to open an attachment, all your company data can be seized, and then you have a choice to make. Do you pay the money to get your data back and if so, has it been copied and/or compromised? How much